דרושים » אבטחת מידע וסייבר » Principal Consultant, Reactive Services, DFIR (Unit 42)

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
4 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
This client-facing role requires the Principal Consultant to lead and produce deliverables for reactive services engagements. You will work directly with multiple customers and key stakeholders, from technical administrators to the C-Suite, to manage incident response engagements from start to finish and provide expert guidance on long-term security posture remediation.
Key Responsibilities
Manage end-to-end incident response engagements, including scoping work, guiding clients through forensic investigations, containing security incidents, and providing long-term remediation recommendations.
Perform reactive incident response functions, including host-based analysis of Windows, Linux, and Mac OS X systems to identify Indicators of Compromise (IOCs).
Investigate data breaches by leveraging digital forensics tools (e.g., EnCase, FTK, X-Ways, SIFT, Splunk) to determine the root cause of compromises and malicious activity.
Examine firewall, web, database, and other log sources to identify evidence of malicious activity, focusing on the details to ensure a thorough and accurate investigation.
Proactively collaborate with and mentor junior team members, sharing expertise in incident response and forensics best practices to empower others and ensure team alignment.
Effectively communicate complex technical findings and strategic recommendations to both technical and executive-level stakeholders.
Travel as needed to meet client engagement demands, typically averaging 20%.
Requirements:
Bachelor's degree in Cybersecurity, Computer Science, or a related field, or equivalent military/professional experience.
8+ years of experience in incident response or digital forensics consulting.
Demonstrated experience leading complex technical engagements and interfacing directly with clients and stakeholders.
Proficiency in host-based forensics, data breach response, and network traffic analysis.
Hands-on experience with forensic tools such as EnCase, FTK, X-Ways, SIFT, Splunk, Volatility, or similar technologies.
Preferred Qualifications
Master's degree in a relevant technical field.
Strong executive presence with experience presenting complex technical concepts to C-suite stakeholders.
Established external presence through public speaking, conference presentations, or industry publications.
Relevant industry certifications such as GIAC (GCFA, GCFE, GNFA), CISSP, or similar.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8638015
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking an experienced Incident Response leader to own and lead the companys response to large-scale, high-impact cyber incidents. This role is responsible not only for technical response, but for cross-company crisis coordination, executive decision support, and ensuring fast, controlled mitigation across engineering, product, legal, communications, and leadership teams.
This is a leadership role for someone who has personally led complex incidents under pressure - including situations involving material business risk, customer impact, regulatory exposure, and executive visibility.
Key Responsibilities:
Incident Leadership & Crisis Management
Serve as the Incident Commander for high-severity cyber incidents, including breaches, supply-chain attacks, insider threats, and platform-wide security events.
Lead company-wide incident response efforts, coordinating technical, operational, legal, communications, and executive stakeholders.
Stand up and orchestrate crisis management teams during major incidents, ensuring clear ownership, decision-making, and execution under pressure.
Drive rapid containment, eradication, and recovery while balancing business continuity, customer impact, and regulatory obligations.
Act as the primary point of contact to executive leadership during incidents, providing clear, concise, timely, and actionable updates.
Cross-Department Coordination
Orchestrate response activities across Security, Infrastructure / Cloud Operations, Product & Application Security
Ensure alignment between technical response actions and business, legal, and regulatory considerations.
Manage external parties when needed
Preparedness & Operational Excellence
Own and continuously improve the incident response framework, including severity definitions, escalation paths, and decision authority.
Design and run executive-level incident simulations and tabletop exercises, including cross-functional and leadership participation.
Ensure high-quality post-incident reviews that result in measurable improvements to controls, detection, and response readiness.
Define and track incident response metrics (MTTD, MTTR, blast radius, decision latency).
Track and follow-up on lessons learned and enhancements to ensure implementation and continuous improvement.
דרישות:
10+ years in cybersecurity, with significant incident response management experience.
Proven experience leading large-scale, cross-company cyber incidents, including incidents involving:
Multiple engineering and operational teams
Executive leadership and board-level visibility
Demonstrated experience acting as Incident Commander or equivalent role during major security events for at least 15 incidents in the past 5 years.
Strong understanding of:
Cloud and SaaS architectures
Identity, access control, and infrastructure security
Detection and response technologies (SIEM, EDR, cloud-native tools)
Offensive background
Ability to translate technical facts into business impact and risk-based decisions.
Critical Skills & Attributes
Crisis leadership: Calm, decisive, and structured under extreme pressure.
Authority without ego: Able to lead across departments without formal reporting lines.
Executive communication: Clear, concise, and credible with senior leadership.
Systems thinker: Understands how technical, human, and process failures compound during incidents.
Bias for action: Moves quickly while maintaining discipline and documentation.
Analytical thinking: Attention to details and ability to connect multiple dots into a concise and accurate picture.
Previous experience at Mandiant, Sygnia, CrowdStrike, Unit 42, or similar elite IR teams
Experience in crypto, fintech, custody, payments, or highly regulated environments
Hands-on background in forensics, threat hunting, or security engineering
Nice to Have
Experience in crypto, fintech, cloud infrastructure, or highly regulated environments
Experience supporting regulatory notifications המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8614256
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
16/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a senior, hands-on Security Operations Lead to build, mature, and operate detection, response, and corporate security capabilities. You will own the engineering, workflows, and processes that keep secure day-to-day, while continuously improving visibility, automation, and operational resilience across both corporate and production environments. This role requires a technical operator who can architect scalable detection and response pipelines, manage endpoint and identity security controls, streamline GTM security enablement, and collaborate across the company to reduce risk. You will balance strategic direction with hands-on execution-ensuring threats are identified quickly, incidents are handled effectively, and the organizations operational security posture remains strong as grows.
Responsibilities:
Own and mature Detection & Response program, including alerting, triage workflows, incident playbooks, and end-to-end response processes.
Build and maintain detection logic, integrations, and automation across logging, SIEM, EDR, cloud telemetry, and internal monitoring systems.
Lead incident investigations, coordinate response across engineering and business teams, and ensure clear communication and post-incident reviews.
Manage Corporate Security Program, including identity and access management, endpoint posture management, corporate data security controls, and DLP practices.
Oversee privileged access workflows and JIT access for corporate and production systems in alignment with least-privilege principles.
Partner with engineering teams to ensure production environments maintain strong security baselines, logging, and monitoring coverage.
Collaborate with GTM/Sales teams to support Security Enablement, including third-party security questionnaires, customer assurance needs, and auditor inquiries.
Build automation-first operational processes that reduce manual overhead and provide consistent, repeatable security outcomes.
Develop and refine detection and response runbooks, escalation paths, and cross-team coordination models.
Maintain and improve incident and operational metrics, dashboards, and KPIs to measure operational efficiency and threat coverage.
Drive the intake and prioritization of security operations requests through Jira and internal workflows.
Work closely with Product Security, Cloud/DevOps, and GRC to ensure shared visibility and aligned operational practices.
Identify operational security gaps, propose improvements, and lead implementation efforts across tooling, processes, and controls.
Promote a culture of proactive detection, fast response, and shared responsibility for organizational security.
Requirements:
Five (5) + years of experience in Engineering / Security Engineering
We build solutions when faced with a capability gap
Youre very comfortable with Kubernetes, Helm, and Terraform
Youre very comfortable with Python, Typescript, or Go
Two (2) + years of experience in Incident Response role
Youve led at least 2 high risk production security incidents
Youve handled the investigation of hundreds of client endpoint security alerts
Bonus points for significant experience in macOS
Youve developed or improved threat detection and signal triage programs
Two (2) + years of experience managing enterprise wide security projects
You have a strong opinion on what a project plan doc should look like
Youve owned and delivered the migration of a high impact security tool (EDR, SIEM, ZTNA, etc.)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8613629
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
were looking for a Incident Management Analyst to help ensure the stability and reliability of our global IT services.
As a key member of the IT Operations team, youll support the rapid response and coordination of critical IT incidents. This role is ideal for someone who thrives in fast-paced environments, communicates clearly under pressure, and enjoys working cross-functionally to solve complex operational challenges.
Youll work closely with technical teams, stakeholders, and leadership to ensure incidents are managed efficiently, communication flows smoothly, and services are restored as quickly as possible. Your work will play a key role in maintaining service continuity and minimizing business impact.

What Youll Do

Identify, log, and classify major IT incidents reported by internal teams or external users
Coordinate response efforts by engaging appropriate technical teams and vendors to diagnose and resolve incidents,coordination calls and document actions, updates, and timelines
Track incidents ,provide a clear and timely communication between technical teams, business stakeholders, and leadership during major incidents. Along with root cause analyses (RCAs), including performance incidents reports,
Assist in preparing RCA reports and ensure documentation and communication are completed as required, Be a contribute to knowledge base articles.
Support daily review meetings to discuss recent and ongoing high-priority incidents and operational work
Follow established Major Incident and Change Management processes, policies, and tools
Generate reports, dashboards, and performance metrics for operational and leadership reviews
Support process adoption and assist with training or guidance related to incident management practices
Requirements:
Bachelors degree in Information Technology, Computer Science, or a related field
3-5 years of experience in IT operations, incident management, or service management
Experience working with enterprise-level incident response or IT service management processes
Strong analytical and problem-solving skills with attention to detail
Excellent written and verbal communication skills
Ability to stay organized and perform effectively under pressure while managing multiple priorities
Familiarity with ITIL principles and service management best practices
Experience with ITSM tools (e.g., ServiceNow or similar platforms) - an advantage
Strong documentation and organizational skills
Fluent in spoken and written English
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621822
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and English Speakers
we are looking for a Incident Response Director.
The Incident Response Director will be key to the success of Incident Response projects worldwide, and should possess strong leadership and client-facing skills, be highly technical and thrive in a fast-paced and dynamic environment.
Main Responsibilities :
Lead multiple teams of top-tier cyber security researchers and forensic experts responding to large-scale and complex cyber-attacks globally, beating real-world sophisticated threat actors.
Become a trusted advisor for client executives during incidents, and the main escalation point for crisis management.
Oversee all client-facing engagements within the EMEA region, assuring top quality delivery standards.
Train, guide and empower team leaders and team members, enhancing their technical, managerial, and consulting skills.
Support efforts to generate new business, by creating professional content and attending events, conferences and client meetings.
Be part of the management group Sygnias global IR department, lead and take part in cross-company projects and cooperations.
Requirements:
Minimum of 3 years of experience leading cybersecurity teams in Penetration Testing, Red Team operations, and/or Research (Malware Analysis, EDR/XDR).
Hands-on technical background in cybersecurity - MUST; Incident Response technical/managerial background - an advantage.
Client-facing experience.
Experience working with global clients - an advantage.
Experience in professional cybersecurity services consulting roles - an advantage.
Strong ability to perform under pressure, manage heavy workloads, and operate effectively in crisis situations.
Proven ability to thrive in a dynamic environment and handle multiple projects under tight deadlines.
Exceptional analytical, reporting, and communication skills in both Hebrew and English (written and spoken).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616675
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Tel Aviv-Yafo
Job Type: More than one
we are looking for an experienced Cyber Security Consulting Manager (Engagement Manager) to lead proactive consulting engagements with clients worldwide. The appropriate candidate will be responsible for the engagement lifecycle - from engagement planning, throughout the day-to-day engagement execution, management of consulting team and client interaction, until the successful engagement presentation and delivery.
Main Responsibilities:
Lead a team of top cyber security consultants (matrix management), to conduct and deliver a variety of proactive cyber security assessments and resilience-enhancing engagements.
Work on multiple engagements in parallel, at client sites or remotely.
Ensure the timely and successful delivery of services according to the engagement scope, objectives, budget, timelines, and clients needs.
Develop and present status updates and summary reports to a variety of audiences, including technical teams, CISOs, CIOs/CTOs, and executive management.
Serve as the trusted advisor to industry-leading multinational organizations, acting as the primary point of contact with clients before, during, and after engagements.
Support the building of long-term relationships with clients, ensuring continuous client impact and success.
Participate in and lead business development activities, internal capability-building efforts, methodology development, and strategic discussions.
Requirements:
Minimum of five years of experience managing complex short to medium-term client-facing cyber security engagements in parallel, with excellent engagement management skills and a proven record.
Extensive understanding of cyber security, security governance, and cyber risk management best practices, frameworks, and principles.
Ability to collaborate with individuals across all levels in a dynamic matrix organizational structure, and coordinate with other departments.
Outstanding analytical, creative, and problem-solving skills and mindset, with the ability to handle uncertainty and complexity.
Excellent communication and presentation skills at all levels of the organization. Ability to articulate security concepts to technical staff and explain them to non-technical staff, including senior management.
Attention to detail and a commitment to maintaining high standards.
Certifications such as C-CISO, CISM, PMP, or similar are an advantage.
Knowledge of regulatory requirements and compliance standards such as NIST, ISO, and others is an advantage.
Excellent communication and presentation skills at all levels of the organization, in both English and Hebrew.
The position requires travel abroad (~15-20%).
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8616696
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
3 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
As the architect of the Autonomous SOC, you will dive deep into Windows and Linux internals to understand modern adversary techniques. Your mission is to transform the complex art of incident response into high-fidelity, automated science. You will investigate attacker tradecraft, analyze forensic artifacts, and build the logic that allows customers to respond to breaches in seconds.
How we work:
The Anatomy of an Attack: We deconstruct complex attack patterns across Windows and Linux to build forensic "blueprints." We don't just find a threat; we map out the exact response flows and forensic steps needed to dismantle it from the inside out.
Precision Matters: We obsess over finding the exact thresholds that allow us to neutralize threats without disrupting the user experience.
Innovation First: We aren't satisfied with off-the-shelf tools; we develop our own research frameworks and leverage AI to amplify our efficiency.
From Insight to Action: We don't just write reports. Every piece of research we conduct is designed to be codified into a sophisticated, automated response playbook that protects our customers at machine speed.
Were looking for people who want to see their research solve "impossible" problems in real-time.
Key Responsibilities
Deep Forensic Research: Conduct original research into Windows and Linux attack surfaces to identify new response and remediation vectors.
Codify IR Tradecraft: Translate complex investigative steps (e.g., memory forensics, binary analysis, or cloud-native IR) into scalable, automated workflows.
Engineer Autonomous Logic: Design "self-healing" security playbooks that don't just alert, but actively neutralize threats across Endpoint, Identity, and Cloud environments.
Telemetry Mining: Hunt through massive datasets in Cortex XSIAM to find the "ground truth" of an attack and validate that your automations are bulletproof.
Shape the Product: Act as a subject matter expert for the engineering team, influencing how our XDR and NDR sensors collect data based on your IR findings.
Requirements:
5+ years of experience in DFIR or Threat Hunting, including a proven track record of manually containing and remediating live security breaches.
Proficiency in Windows (Processes, Registry, RPC, WMI) and/or Linux internals (Kernel modules, Syscalls, Namespaces).
Experience with forensic frameworks and tooling such as Volatility, Sleuthkit, Velociraptor, or similar environments.
Proficiency in writing clean, testable, and efficient Python code with the ability to approach automation as a formal software engineering discipline.
Ability to query and manipulate large-scale telemetry using SQL or Pandas to prove complex research hypotheses.
Preferred Qualifications
Hands-on experience authoring SOAR playbooks (Cortex XSOAR/XSIAM preferred).
Previous experience in content or engineering for XDR, EDR, NDR, or SOAR products.
Background in machine learning or statistical modeling for detection and response.
Practical experience with big data platforms.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8639319
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Security Research Team Leader to join our team of highly skilled professionals, which includes security researchers, operations analysts, and data scientists.
This team continuously hunts for threats, evaluates emerging attack vectors, and develops innovative detection techniques in the field of malvertising and advertising security. Our mission is to protect customers from attacks generated by malicious advertisements (malvertising).
What You'll Do:
Lead detection innovation. Design and implement new methodologies to identify and stop malvertising attacks before they reach end users.
Drive signal research. Research and develop signal-collection strategies across mobile and desktop environments to strengthen detection and enhance customer protection.
Expand scanning capabilities. Devise approaches to overcome bot detection mechanisms and ensure comprehensive website coverage.
Deliver customer impact. Understand customer-specific security requirements, translate them into actionable research, and consistently exceed expectations.
Map adversary behavior. Discover and document the tactics, techniques, and procedures (TTPs) employed by malvertisers and related threat actors.
Elevate data-driven detection. Create and validate data insights that enhance detection quality and drive measurable improvements in protection efficacy.
Share knowledge broadly. Publish security research through blog posts, internal knowledge bases, conference presentations, and external engagements - translating complex discoveries into clear, impactful narratives.
Hunt threats proactively. Identify malicious activity across the internet, reverse-engineer attack execution, and produce thorough technical documentation.
Stay ahead of the curve. Continuously monitor the cybersecurity landscape for trends, emerging threats, and developments relevant to our mission.
Mentor and lead. Contribute high-impact work that moves team-level metrics, while actively providing leadership, guidance, and mentorship to peers and junior researchers.
Build better tools. Develop techniques, scripts, and tooling to streamlne workflows and amplify the broader team's productivity.
Requirements:
Education: A Bachelor of Science in Computer Science or equivalent experience (e.g., alumni of a technological or military intelligence unit).
Deep Web Expertise: Strong understanding of web architecture and protocols, including the Document Object Model (DOM), JavaScript, HTTP/HTTPS, and IPv4/IPv6.
Security Minded: Solid knowledge of the broader cybersecurity threat landscape and the mindsets of adversaries.
Experienced Leader: Over 3 years of proven experience in leading cybersecurity research, with a track record of delivering meaningful outcomes.
Strong Communicator: Excellent written and spoken English skills, with the ability to clearly convey technical findings to both technical and non-technical audiences.
Skilled in Scripting: Hands-on proficiency in Python and JavaScript for research, automation, and tooling.
Data Fluent: Solid experience in data analysis using SQL, Python, or equivalent tools.
Self-Driven and Passionate: Motivated, independent, and genuinely committed to finding and stopping bad actors on the internet.
Natural Leader: Capable of inspiring and elevating those around you through contributions, professionalism, and a collaborative spirit.
Curious about AI/ML: Foundational understanding of machine learning and AI concepts, with a strong aptitude and enthusiasm for rapidly acquiring new skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8627385
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
3 ימים
Location: Tel Aviv-Yafo
Job Type: Full Time
Are you an innovative security researcher with a deep understanding of the cyber threat landscape and a passion for protecting modern environments? Do you want to tackle the challenge of securing enterprise networks against evolving threats?
We are seeking a highly skilled professional to focus on the critical, fast-paced domain of Virtualization Security. As a foundational member of a newly formed and growing team, you will explore the 'blue ocean' of threat detection, pioneering next-generation capabilities within the worlds largest cybersecurity enterprise. This is a unique opportunity to apply your expertise and influence the future of threat prevention-helping us build cutting-edge security solutions from the ground up.
Key Responsibilities
Conduct deep research into virtualization technologies, and targeted attacks to fortify our attack prevention mechanisms.
Stay current with the latest attacker methodologies, APT campaigns, and Tactics, Techniques, and Procedures (TTPs) targeting virtualization systems.
Analyze emerging threats and malware to identify new techniques and formulate effective detection and prevention strategies.
Leverage AI and big data methodologies to investigate and analyze extensive datasets across our customer base.
Design cutting-edge protection components and develop sophisticated detection rules to enhance the effectiveness of our security solutions.
Drive the research and development of novel protection concepts, seeing them through to production-grade quality, and serve as a subject matter expert in the field.
Play a pivotal role in shaping the future of our security product offerings.
Collaborate closely with Engineering, Product Management, and other research teams to seamlessly translate research findings and insights into new production features.
Requirements:
Required Qualifications
5+ years of experience in cybersecurity research, with a proven track record of impactful projects.
B.Sc. or M.Sc. in Computer Science, Software Engineering, Computer Engineering, or equivalent military experience required
Hands-on experience in real-world threat hunting, incident response, or detection engineering.
Solid knowledge of the cyber threat landscape, modern malware techniques, and APTs.
Proficiency in programming languages such as Python, Go, Java, or other relevant languages.
Strong understanding of OS internals (Windows, Linux, and macOS, for example).
Excellent problem-solving skills and a passion for cybersecurity innovation.
Ability to work independently, take initiative, and collaborate effectively in a team environment.
Preferred Qualifications
Experience with virtualization platforms or understanding of virtualization-related attacks (e.g., focused on ESXi/vCenter).
Proven background in security solution development, particularly within the EDR/XDR space.
Proficiency in reverse engineering, including practical experience with disassembly and debugging tools.
Demonstrated experience utilizing advanced techniques like statistics, machine learning, or complex data analysis for security-related applications.
Experience with vulnerability research or development within the Linux environment.
Experience with research or development focused on Linux internals.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8639135
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are expanding our Research Team and are looking for a Junior Malware Researcher with a strong technical mindset, excellent communication skills, and a passion for problem-solving.
As a Malware Researcher, you will be responsible for hunting emerging malware and malvertising campaigns and developing effective detection methods to protect global customers. You will work closely with the R&D and Product teams and be part of a friendly, professional team based in Tel Aviv, supporting customers worldwide.
Responsibilities:
Detect, monitor, and hunt new malvertising and malware threats
Research new attack vectors, delivery methods, and evasion techniques
Develop and improve detection logic and signatures
Investigate malicious campaigns using internal tools, databases, logs, and external intelligence sources to uncover hidden patterns
Analyze web traffic, scripts, redirects, and network behavior to identify malicious activity
Collaborate with R&D and Product teams to translate research into production-grade protections
Contribute to internal documentation, research reports, and best practices to improve knowledge sharing and support processes
Requirements:
0-1 years of relevant experience, or equivalent technical background (military, academic, or self-driven research)
Strong understanding of web technologies , including HTML, JavaScript, browser behavior, and client-side execution
Solid foundation in security concepts, such as web threats, malware behavior, and attack chains
Familiarity with networking concepts (HTTP/HTTPS, DNS, redirects, basic TCP/IP)
Hands-on experience with at least one programming or scripting language: JavaScript, TypeScript, or Python
Basic experience working with SQL and data analysis
Ability to investigate issues end-to-end, from technical root cause to customer impact
Strong analytical thinking and problem-solving skills
Fluent English (written and spoken)
Independent, accountable, proactive, and comfortable taking ownership of tasks
Advantages (Nice to Have):
Experience or familiarity with the ad tech ecosystem (DSPs, SSPs, publishers, ad networks)
Exposure to malware analysis, threat intelligence, or SOC workflows
Familiarity with AI tools or AI-assisted research workflows
Experience with monitoring, visualization, or log analysis tools (e.g., Kibana, Grafana)
Basic experience with automation, scripting, or data parsing
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8627389
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a Research Team Lead to establish and lead a cross-product research team focused on horizontal, high-impact initiatives that influence multiple company offerings.
Unlike product-embedded research roles, this team drives foundational and strategic research projects across networking, security, identity, automation, and AI-driven capabilities. Examples include large-scale reasoning systems, autonomous policy frameworks, cross-domain detection and response concepts (xOps), and platform-wide intelligence capabilities.
You will combine deep technical expertise with strong leadership and execution skills -identifying impactful research directions, building a high-performing team, and turning advanced research into real platform capabilities used by thousands of customers worldwide.
Responsibilities
Technical Vision & Strategy
Define and execute the roadmap for cross-product research initiatives.
Identify high-leverage research opportunities that impact multiple domains and products.
Drive long-term architectural thinking and influence platform evolution.
Balance innovation, experimentation, and production-readiness.
Team Leadership
Recruit, mentor, and grow a multidisciplinary team of researchers (AI, data, algorithms, networking, security).
Establish high standards for research rigor, experimentation methodology, and engineering quality.
Foster a culture of ownership, collaboration, and technical excellence.
Research & Execution
Lead complex, ambiguous research initiatives from ideation through validation and productionization.
Design large-scale experiments and validation methodologies using our companys data platform.
Drive innovation in areas such as:
Autonomous policy systems
Cross-domain detection and response frameworks
Large-scale reasoning and decision systems
Data-driven optimization and automation capabilities
Ensure research outcomes are measurable, scalable, and aligned with business impact.
Cross-Functional Collaboration
Work closely with Product, Engineering, Architecture, and Product Research teams to translate research into shipped capabilities.
Provide technical guidance and influence cross-organizational decisions.
Act as a bridge between exploratory research and production systems.
Communication & Influence
Present research findings and strategic recommendations to senior leadership.
Produce clear technical documentation, design proposals, and internal position papers.
Represent Platform Research as a center of excellence for cross-product innovation.
Requirements:
Education & Experience
BSc/MSc (PhD is a plus) in Computer Science, Electrical Engineering, or a related field.
7+ years of experience in applied research, advanced engineering, or system-level innovation.
2+ years of experience leading technical teams or major cross-functional initiatives.
Technical Expertise
Strong background in networking and cybersecurity, including deep understanding of network protocols, architectures, threat models, and modern security frameworks, with the ability to design and analyze secure, large-scale systems.
Experience applying AI/ML in production environments.
Experience designing and delivering complex systems operating at scale.
Hands-on programming experience (Python, Go, Java, or similar).
Experience working with large datasets and experimentation frameworks.
Strong analytical thinking and ability to formalize complex problems.
Leadership & Soft Skills
Proven ability to lead multidisciplinary teams.
Strategic thinker with strong execution capabilities.
Comfortable operating in ambiguous, fast-moving environments.
Excellent English communication skills.
Team player, responsible, and well-organized.
Nice to Have
Experience building autonomous or decision-making systems.
Experience in networking or security product companies.
Publications, patents, or recognized technical contributions.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598188
סגור
שירות זה פתוח ללקוחות VIP בלבד